Assurance Technology of System Test Based on Operators' Aspects. [Citation Graph (, )][DBLP]
Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection. [Citation Graph (, )][DBLP]
Low Cost Secure Computation for the General Client-Server Computation Model. [Citation Graph (, )][DBLP]
Evaluating Security Risks following a Compliance Perspective. [Citation Graph (, )][DBLP]
On the Comparison of Network Attack Datasets: An Empirical Analysis. [Citation Graph (, )][DBLP]
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. [Citation Graph (, )][DBLP]
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. [Citation Graph (, )][DBLP]
A Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing. [Citation Graph (, )][DBLP]
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks. [Citation Graph (, )][DBLP]
Towards Secure Trust Bootstrapping in Pervasive Computing Environment. [Citation Graph (, )][DBLP]
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination. [Citation Graph (, )][DBLP]
A Low Energy Soft Error-Tolerant Register File Architecture for Embedded Processors. [Citation Graph (, )][DBLP]
Randomization Based Probabilistic Approach to Detect Trojan Circuits. [Citation Graph (, )][DBLP]
On the Integrity of Lightweight Checkpoints. [Citation Graph (, )][DBLP]
A Fast Performance Analysis Tool for Multicore, Multithreaded Communication Processors. [Citation Graph (, )][DBLP]
Random Relaxation Abstractions for Bounded Reachability Analysis of Linear Hybrid Automata: Distributed Randomized Abstractions in Model Checking. [Citation Graph (, )][DBLP]
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems. [Citation Graph (, )][DBLP]
A Few Remarks about Formal Development of Secure Systems. [Citation Graph (, )][DBLP]
Verification of Exception Control Flows and Handlers Based on Architectural Scenarios. [Citation Graph (, )][DBLP]
Localizing Program Errors via Slicing and Reasoning. [Citation Graph (, )][DBLP]
A Timed Extension of Property Sequence Chart. [Citation Graph (, )][DBLP]
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications. [Citation Graph (, )][DBLP]
Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based Approach. [Citation Graph (, )][DBLP]
Mutation-Based Testing of Format String Bugs. [Citation Graph (, )][DBLP]
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code. [Citation Graph (, )][DBLP]
A Multi-Periodic Synchronous Data-Flow Language. [Citation Graph (, )][DBLP]
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications. [Citation Graph (, )][DBLP]
At What Level of Granularity Should We be Componentizing for Software Reliability? [Citation Graph (, )][DBLP]
A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models. [Citation Graph (, )][DBLP]
Software Quality Improvement via Pattern-Based Model Refactoring. [Citation Graph (, )][DBLP]
A Novel Model for Component-Based Software Reliability Analysis. [Citation Graph (, )][DBLP]
Automotive Safety Case A Qualitative Case Study of Drivers, Usages, and Issues. [Citation Graph (, )][DBLP]
Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis. [Citation Graph (, )][DBLP]
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques. [Citation Graph (, )][DBLP]
Layered Memory Architecture for High IO Intensive Information Services to Achieve Timeliness. [Citation Graph (, )][DBLP]
Securing Sensor Nodes Against Side Channel Attacks. [Citation Graph (, )][DBLP]
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. [Citation Graph (, )][DBLP]
Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems. [Citation Graph (, )][DBLP]
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management. [Citation Graph (, )][DBLP]
A Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community System. [Citation Graph (, )][DBLP]
Architecture Centric System Design for Supporting Reconfiguration of Service Oriented Systems. [Citation Graph (, )][DBLP]
A Self-Managing Brokerage Model for Quality Assurance in Service-Oriented Systems. [Citation Graph (, )][DBLP]